menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
When https is used, which element of the communication is encrypted? select one: a. url of the requested document b. contents of the document c. cookies sent from browser to server d. all of the above?
asked
Feb 10, 2018
140k
views
5
votes
When https is used, which element of the communication is encrypted? select one:
a. url of the requested document
b. contents of the document
c. cookies sent from browser to server
d. all of the above?
Computers and Technology
college
Checksum
asked
by
Checksum
8.0k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
7
votes
Answer: d. All of the above
HTTPS is a secure form of HTTP. It uses certificate authentication to encrypt any or all protocols utilized by HTTP.
The security that HTTPS provides protects transactions and communications over the web from snooping.
SmrtGrunt
answered
Feb 17, 2018
by
SmrtGrunt
8.4k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
May 10, 2019
218k
views
I need to pass my exam XD Ben is accessing his bank account using online banking. What protocol in the URL lets him know that the website is secure and encrypted? HTTP SHTTP HTTPS FTP
Kathalina
asked
May 10, 2019
by
Kathalina
8.2k
points
Computers and Technology
middle-school
2
answers
1
vote
218k
views
asked
Sep 19, 2024
212k
views
_______ delivers webpages to computers requested through a browser. a) ISP (Internet Service Provider) b) HTML (Hypertext Markup Language) c) URL (Uniform Resource Locator) d) DNS (Domain Name System)
Beetroot
asked
Sep 19, 2024
by
Beetroot
8.3k
points
Computers and Technology
high-school
1
answer
2
votes
212k
views
asked
Dec 22, 2024
14.9k
views
true or false? in a browser or uniform resource locator (url) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created.
Desha
asked
Dec 22, 2024
by
Desha
8.1k
points
Computers and Technology
high-school
1
answer
2
votes
14.9k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org